Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8943: CWE-288 Authentication Bypass Using an Alternate Path or Channel in latepoint LatePoint Plugin

0
Critical
VulnerabilityCVE-2024-8943cvecve-2024-8943cwe-288
Published: Tue Oct 08 2024 (10/08/2024, 08:33:18 UTC)
Source: CVE Database V5
Vendor/Project: latepoint
Product: LatePoint Plugin

Description

CVE-2024-8943 is a critical authentication bypass vulnerability in the LatePoint WordPress plugin versions up to 5. 0. 12. It arises from insufficient verification of user identity during the booking customer step, allowing unauthenticated attackers to log in as any existing user if they know the user ID. This includes administrator accounts, posing a severe risk to site security. The vulnerability only applies if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Partial remediation was introduced in version 5. 0. 12, with a full patch available in 5. 0.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:56:06 UTC

Technical Analysis

The LatePoint plugin for WordPress, widely used for appointment booking, contains a critical authentication bypass vulnerability identified as CVE-2024-8943. This vulnerability stems from inadequate verification of the user identity during the booking customer step, specifically when the plugin setting "Use WordPress users as customers" is enabled. An attacker who knows a valid user ID can exploit this flaw to bypass authentication controls and log in as that user, including administrators, without any credentials or interaction. This is classified under CWE-288, which involves authentication bypass via alternate paths or channels. The flaw affects all versions up to and including 5.0.12, with a partial fix in 5.0.12 and a complete fix in 5.0.13. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity due to its network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact make this a high-risk issue for WordPress sites using this plugin with the relevant setting enabled.

Potential Impact

The vulnerability allows unauthenticated attackers to gain unauthorized access to any user account on a vulnerable WordPress site, including high-privilege administrator accounts. This can lead to complete site takeover, data theft, modification or deletion of content, installation of backdoors or malware, and disruption of services. The compromise of administrator accounts undermines the integrity and availability of the entire WordPress installation and potentially other integrated systems. Organizations relying on LatePoint for customer bookings face risks of customer data exposure and reputational damage. Since the exploit requires knowledge of user IDs, attackers targeting sites with predictable or enumerated user IDs are at greater risk. The impact extends to any organization using the vulnerable plugin with the affected setting enabled, including small businesses, service providers, and enterprises leveraging WordPress for client management.

Mitigation Recommendations

Immediate upgrade to LatePoint plugin version 5.0.13 or later is the most effective mitigation, as it fully patches the authentication bypass vulnerability. Until the update can be applied, administrators should disable the "Use WordPress users as customers" setting to prevent exploitation. Additionally, restricting access to the booking customer step via web application firewalls or IP whitelisting can reduce exposure. Site owners should audit user ID enumeration possibilities and implement rate limiting or CAPTCHA challenges to hinder automated attacks. Monitoring logs for suspicious login attempts or unusual activity related to the booking process is recommended. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, educating administrators about the risk and ensuring timely patch management will help prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-17T11:53:20.789Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b3ab7ef31ef0b54f7fb

Added to database: 2/25/2026, 9:35:54 PM

Last enriched: 2/25/2026, 10:56:06 PM

Last updated: 2/26/2026, 8:45:29 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats